Search For:

Displaying 1-22 out of 22 total
Privacy: Front and Center
Found in: IEEE Security & Privacy
By Ann Cavoukian,Alan Davidson,Ed Felton,Marit Hansen,Susan Landau,Anna Slomovic
Issue Date:September 2012
pp. 10-15
In the 10 years since IEEE Security & Privacy's initial launch, privacy has moved from being a side story occasionally covered in the newspaper to a central issue of our times. With the Internet, through the rise of online social networks, track...
 
Going Bright: Wiretapping without Weakening Communications Infrastructure
Found in: IEEE Security & Privacy
By Steven M. Bellovin,Matt Blaze,Sandy Clark,Susan Landau
Issue Date:January 2013
pp. 62-72
Mobile IP-based communications and changes in technologies, including wider use of peer-to-peer communication methods and increased deployment of encryption, has made wiretapping more difficult for law enforcement, which has been seeking to extend wiretap ...
 
Overview of Cyber Security: A Crisis of Prioritization
Found in: IEEE Security and Privacy
By Susan Landau, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider
Issue Date:May 2005
pp. 9-11
An overview of PITAC?s response to cybersecurity issues, from Cyber Security: A Crisis of Prioritization.
 
Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations
Found in: IEEE Security & Privacy
By Susan Landau
Issue Date:January 2014
pp. 62-64
In the July/August 2013 issue of IEEE Security & Privacy, we published Susan Landau's analysis of the impact of Edward Snowden's initial leak of documents. As more files are revealed, we want to provide up-to-date analysis of what they mean to you,...
 
Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations
Found in: IEEE Security & Privacy
By Susan Landau
Issue Date:July 2013
pp. 54-63
Did Edward Snowden cause irreparable harm, or did he reveal facts that should be publicly examined? What are the facts, anyhow? This article seeks to put the Snowden revelations in context, explaining what's new, why it matters, and what might happen next.
 
Politics, love, and death in a world of no privacy
Found in: IEEE Security & Privacy
By Susan Landau
Issue Date:May 2013
pp. 11-13
Is privacy possible in a state in which everyone's interests are visible via their postings—and those of their friends—on online social networks?
 
The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy
Found in: IEEE Security and Privacy
By Susan Landau
Issue Date:January 2009
pp. 58-62
The US National Research Council has tackled a big set of issues: preserving privacy in the face of data mining and behavioral surveillance programs that are being used in the US government's fight against terrorists. It has come up with commonsense soluti...
 
Security and Privacy Landscape in Emerging Technologies
Found in: IEEE Security and Privacy
By Susan Landau
Issue Date:July 2008
pp. 74-77
Recent events spawned a need for better communications of security systems, including industrial control systems and emergency management systems. This work is in initial phases and the author reports it here. In this final column for emerging standards an...
 
I'm Pc01002/SpringPeeper/ED288l.6; Who are You?
Found in: IEEE Security and Privacy
By Susan Landau, Deirdre K. Mulligan
Issue Date:March 2008
pp. 13-15
In considering identity management, the first issue is—What is identity? This is, of course, an issue that has plagued poets, philosophers, and playwrights for centuries. We're concerned with a more prosaic version of the question: How does an entity recog...
 
Risking Communications Security: Potential Hazards of the Protect America Act
Found in: IEEE Security and Privacy
By Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neumann, Jennifer Rexford
Issue Date:January 2008
pp. 24-33
A new US law allows warrantless wiretapping whenever one end of the communication is believed to be outside national borders. This creates serious security risks: danger of exploitation of the system by unauthorized users, danger of criminal misuse by trus...
 
Security, Wiretapping, and the Internet
Found in: IEEE Security and Privacy
By Susan Landau
Issue Date:November 2005
pp. 26-33
Wiretaps have been used since the invention of the telegraph and have been a legal element of the U.S. law-enforcement arsenal for over a quarter century. In 1994, in keeping with law enforcement's efforts to have laws stay current with changing technologi...
 
Functional decomposition of polynomials
Found in: Foundations of Computer Science, Annual IEEE Symposium on
By Joachim von zur Gathen, Dexter Kozen, Susan Landau
Issue Date:October 1987
pp. 127-131
No summary available.
 
Educating Engineers: Teaching Privacy in a World of Open Doors
Found in: IEEE Security & Privacy
By Susan Landau
Issue Date:May 2014
pp. 66-70
nullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnull...
 
The problem isn't attribution: it's multi-stage attacks
Found in: Proceedings of the Re-Architecting the Internet Workshop (ReARCH '10)
By David D. Clark, Susan Landau
Issue Date:November 2010
pp. 1-6
As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network attribution at the packet layer. The intent is for ...
     
Communications surveillance: privacy and security at risk
Found in: Communications of the ACM
By Susan Landau, Whitfield Diffie, Whitfield Diffie, Whitfield Diffie
Issue Date:November 2009
pp. 42-47
As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.
     
Communications Surveillance: Privacy and Security at Risk
Found in: Queue
By Susan Landau, Whitfield Diffie, Whitfield Diffie
Issue Date:September 2009
pp. 10-15
As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.
     
Privacy and securityA multidimensional problem
Found in: Communications of the ACM
By Susan Landau
Issue Date:November 2008
pp. 25-26
It's not just science or engineering that will be needed to address security concerns, but law, economics, anthropology, and more.
     
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Found in: Proceedings of the ACM workshop on Digital rights management (DRM '06)
By Doug Twilleager, Renee Stratulate, Susan Landau
Issue Date:October 2006
pp. 1-8
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights management (DRM) that only allows the user to view the film rather than copy, edit, or create n...
     
What lessons are we teaching?
Found in: Communications of the ACM
By Susan Landau
Issue Date:June 2005
pp. 144
Several recommendations for improving the effectiveness of anti-spam legislation are presented.
     
Technical opinion: designing cryptography for the new century
Found in: Communications of the ACM
By Susan Landau
Issue Date:January 1988
pp. 115-120
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
     
Crypto policy perspectives
Found in: Communications of the ACM
By Anthony Lauck, Clinton C. Brooks, David L. Sobel, Dorothy E. Denning, Douglas Miller, Peter G. Neumann, Scott Charney, Stephen Kent, Susan Landau, Whitfield Diffie
Issue Date:January 1988
pp. 115-121
We consider here the importance of an overall systems viewpoint in avoiding computer-related risks. According to Webster's, a system is a regularly interacting or interdependent group of items forming a unified whole. In computer systems, one person's comp...
     
Solvability by radicals is in polynomial time
Found in: Proceedings of the fifteenth annual ACM symposium on Theory of computing (STOC '83)
By Gary Lee Miller, Susan Landau
Issue Date:December 1983
pp. 140-151
Every high school student knows how to express the roots of a quadratic equation in terms of radicals; what is less well-known is that this solution was found by the Babylonians a millenia and a half before Christ [Ne]. Three thousand years elapsed before ...
     
 1